1. M. Abadi, J. Feigenbaum, and J. Kilian. On hiding information from an oracle. Journal of Computer and System Sciences, 39 (1): 21–50, Aug 1989.
2. M. Bellare and S. Goldwasser. Encapsulated key escrow. Technical Report Technical Report 688, MIT Laboratory for Computer Science, April 1996.
3. M. Bellare and S. Goldwasser. Verifiable partial key escrow. In Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 78–91, April 1997.
4. M. Blum and H. Wasserman. Software reliability via run-time result-checking. Journal of the ACM. To appear. Preliminary version. Software reliability via run-time result-checking. Journal of the ACM. To appear. Preliminary version: ‘Program Result-Checking: A Theory of Testing Meets a Test of Theory, ’ Proc. 35th IEEE FOCS, 1994, pp. 382–392.
5. J. Cai, R. Lipton, R. Sedgewick, and A. Yao. Towards uncheatable benchmarks. IEEE Structures, pages 2–11, 1993.